Page 33 - EngineerIT July 2022
P. 33

TECHNOLOGY


        Radio waves to protect computers







             p to now, protecting hardware
             against manipulation has been
       Ua laborious business: expensive,
        and only possible on a small scale. And
        yet, two simple antennas might do the
        trick.
           Radio waves could protect
        computers, as well as card readers, from
        attacks on their hardware. As a team
        from the Max Planck Institute for Security
        and Privacy and the Ruhr University
        in Bochum has shown, the signal from
        one antenna in a device generates a
        characteristic electromagnetic pattern
        that is received by a second antenna. If
        an attacker manipulates the device with a
        wire, for example, the radio wave pattern
        changes and blows the whistle on the   The researchers can monitor an entire system, such as a server, with simple radio antennas (pink)
        manipulation like an alarm system.
           Payment transactions, business    components via conductive paths. A   laid the foundations for this technology
        secrets, documents that are important   tiny metallic object, positioned in the   when he was a RUB researcher.
        for national security: today, the world’s   right place on the hardware, can be
        most valuable secrets are often no longer   enough to tap into these data streams.   Protection through radio waves
        stored on paper, but rather as ones and   “Fraudsters have used this simple   Mechanisms designed to protect
        zeros in virtual space. When we suspect   method, for example, to tap credit card   hardware from tampering do exist,
        that these secrets are in danger, we   data from card readers,” say Paul Staat   of course. “Typically, it’s a type of foil
        usually imagine a threat from afar –   and Johannes Tobisch. Both are doing   with thin wires in which the hardware
        attackers trying to capture confidential   their PhDs at Ruhr-Universität Bochum   component is wrapped,” explains
        data through cyberattacks. But there   (RUB) and conduct research at the Max   Staat. “If the foil is damaged, an alarm
        is another threat, a much more direct   Planck Institute for Security and Privacy.   is triggered.” However, this method
        way to get into other people’s systems,   As members of Christof Paar’s team,   can only be used to protect small
        namely by tampering with the hardware.  they are developing methods to protect   components, not the whole system: it’s
           The valuable information is ultimately   against hardware manipulation. They are   impossible to wrap an entire computer
        nothing more than electrical currents   cooperating with Christian Zenger from   case in the foil, typically only an
        that travel between different computer   the RUB spin-off company PHYSEC, who   individual key component like a memory
                                                                                  element or a processor, for example.
                                                                                  Tobisch and Staat are working on a
                                                                                  technology that would monitor entire
                                                                                  systems for manipulation – and wouldn’t
                                                                                  be so expensive.
                                                                                    For this purpose, the researchers
                                                                                  employ radio waves. They install two
                                                                                  antennas in the system that they want
                                                                                  to monitor: a transmitter and a receiver.
                                                                                  The transmitter sends out a special
                                                                                  radio signal that spreads everywhere in
                                                                                  the system and is reflected by the walls
                                                                                  and computer components. All these
                                                                                  reflections cause a signal to reach the
        Paul Staat ( left) and Johannes Tobisch are doing their PhDs at RUB and conducting research at   receiver that is as characteristic of the
        the Max Planck (© Michael Schwettmann)                                    system as a fingerprint.



                                                    EngineerIT | July 2022 | 31
   28   29   30   31   32   33   34   35   36   37   38